2,541 research outputs found
Exploration of The Duality Between Generalized Geometry and Extraordinary Magnetoresistance
We outline the duality between the extraordinary magnetoresistance (EMR),
observed in semiconductor-metal hybrids, and non-symmetric gravity coupled to a
diffusive gauge field. The corresponding gravity theory may be
interpreted as the generalized complex geometry of the semi-direct product of
the symmetric metric and the antisymmetric Kalb-Ramond field:
(). We construct the four dimensional covariant
field theory and compute the resulting equations of motion. The equations
encode the most general form of EMR within a well defined variational
principle, for specific lower dimensional embedded geometric scenarios. Our
formalism also reveals the emergence of additional diffusive pseudo currents
for a completely dynamic field theory of EMR. The proposed equations of motion
now include terms that induce geometrical deformations in the device geometry
in order to optimize the EMR. This bottom-up dual description between EMR and
generalized geometry/gravity lends itself to a deeper insight into the EMR
effect with the promise of potentially new physical phenomena and properties.Comment: 13 pages and 6 figures. Revised/edited for clarity and purpose.
Several references added. Updated title based on suggestions and comments
received. Version accepted for publication in Phys.Rev.
SELECTION OF 5G AKMA AUTHENTICATION POLICY AND APPLICATION FUNCTION BASED ON A TENANT IDENTIFIER OBTAINED FROM A USER EQUIPMENT ESIM
AKMA (Authentication and Key Management for Applications) is an authentication mechanism introduced in Third Generation Partnership Project (3GPP) Technical Specification (TS) 33.535, Release 16 (and further enhanced in later releases) that can be used to leverage an operator authentication infrastructure to secure communications between a user equipment (UE) and an Application Function (AF). Proposed herein are techniques to facilitate UE authentication for multi-tenant cloud environments. Broadly, techniques proposed herein provide for using a tenant identifier (ID) associated with the eSIM (electronic or embedded Subscriber Identity Module) of a UE in order to determine/obtain the correct policy that corresponds to a given enterprise identified by the tenant ID. The policy can be used to select appropriate keying material to derive AKMA keys and select an appropriate AF of a multi-tenanted cloud provider that is partnering with a 5G provider to facilitate connection to cloud services of the provider
WORKLOAD IDENTITY MANAGEMENT USING AGENT AND CONTROLLER
Techniques described herein provide for an approach in which an agent provisions a workload with initial credentials based on a workload profile that is learned using a controller. During runtime, when the workload requests a new token using its initial token to interact with peer workloads, an authorization server coordinates with the controller to learn the upstream/downstream peer workloads that will be in the path for the flows the workload will handle. Based on the security posture of those workloads, an appropriate scoped token is returned. This ensures malicious / untrusted workloads in the path cannot re-use or proxy the token
AUTHENTICATION AND KEY MANAGEMENT OF IOT APPLICATIONS WITH EXTENDED WIFI AUTHENTICATION (WIFI AKMA)
Internet of things (IoT) devices frequently apply insufficient authentication mechanisms with their application servers due to the constrained nature of such devices. For example, most IoT devices lack the resources that are necessary to store usernames and passwords, certificates, and keys in a secured manner. The challenge that was described above is solved in a 3rd Generation Partnership Project (3GPP) fifth-generation (5G) wireless environment through the Authentication and Key Management for Applications (AKMA) initiative. However, there is no AKMA-equivalent facility within a WiFi environment. Accordingly, techniques are presented herein that extend the WiFi authentication process to support application server authentication for constrained devices. Aspects of the presented techniques support an exchange of a WiFi key and a key identifier (which may be referred to herein as a KAKMA key and an A-KID) as part of an Extensible Authentication Protocol (EAP) tunnel using a new information element (IE) once an authentication process has successfully completed. Such an exchange allows a station (STA) device to use the key tuple {KAKMA, A-KID} to access any application functions that are grouped with that key identifier (i.e., A-KID) without requiring any further authentication
TRANSLATING BETWEEN REALTIME BI-DIRECTIONAL CONVERSATIONS AND PUSH-TO-TALK SYSTEMS
The techniques presented herein provide an artificial intelligence (AI)-based conversational agent to allow communications between (i.e., “translate for”) a push-to-talk (PTT) client and endpoints that support real-time, bi-directional conversation, including voice over Internet Protocol (VoIP) endpoints (also referred to as IP telephony endpoints) and endpoints running multimedia applications that allow bi-directional, real-time conversation. These techniques are applicable when PTT deployments allow direct calls between endpoints that support real-time, bi-directional conversation (e.g., VoIP endpoints) and PTT endpoints. During these calls, the techniques may allow a caller from the real-time, bi-directional conversation endpoint to have a real-time or nearly real-time conversational experience while the PTT user has a start-stop PTT experience
Contributions of Panchanan Maheshwari's school to angiosperm embryology through an integrative approach
P. Maheshwari who served as Professor and Head of the Department of Botany, University of Delhi from 1950 to 1966 built a flourishing school of embryology which became internationally recognized. His colleagues and students have contributed significantly to all areas of embryology through integrative approaches. In memory of his birth centenary year, we have prepared this article that summarizes the work done by his students and traces the phenomenal advances made in some areas in the post-Maheshwari era
USING BLOCKCHAIN TO SIMPLIFY SESSION INITIATION PROTOCOL OVERLOAD CONTROL
Techniques are described herein by which the Session Initiation Protocol (SIP) server overload problem may be significantly simplified by using a distributed system where transactions can be authorized and stored. For example, a technology like blockchain may enable a centralized, shared, and secure transaction database to be used to communicate SIP server overload information. SIP server overload information may be shared between servers that are part of a trust domain. The trust domain may be confined within a network or span across network boundaries (e.g., between enterprise edges / SIP trunk providers / SIP calling cloud providers)
PROVIDING ENHANCED AUGMENTED REALITY EXPERIENCES USING RELATIONSHIP AND CONTEXTUAL DATA
Techniques are provided herein for using relationship intelligence of the participants in the meeting to provide a customized Augmented Reality (AR) experiences for each participant of that meeting whose meeting client is AR-ready. These techniques may allow developers to provide their own relationship information and integrate that information with the meeting platform by proposing a set of Communications Platform as a Service (CPaaS) Software Development Kit (SDK) enhancements described herein
ENABLING DESKTOP SWITCHING DURING SCREEN SHARING BASED ON CURSOR MOVEMENT
Existing screen sharing-related solutions primarily focus on the sharing of a single screen or desktop. For example, to share a screen a user typically has to select the screens that they wish to share every time they move to a different screen. This can break a collaboration flow if a user has multiple screens or desktops, and they keep moving across them during a screen sharing event. Techniques are presented herein that fill this gap by allowing a presenter to share their desktops based on the current location of their mouse. As the mouse moves from one desktop to another, a shared desktop may also change correspondingly
REAL-TIME SECURE SHARING OF LIVE MEETING CONTENT THROUGH VOICE COMMANDS OR USER CLICKS
With the dramatic increase in working from home due to the COVID-19 situation, the reliance on online collaborative sessions has increased manifold and there is a significant need to have an enhanced immersive sharing and collaborative experience in live meetings. Existing sharing and collaboration mechanisms (including the sharing of meeting presentations ahead of time, etc.) all suffer from different weaknesses. To address these types of challenges, techniques are presented herein that support a means whereby, among other things, an authorized participant in an online meeting may request (through, for example, clicking on a shared meeting screen, using a voice input, etc.) that the meeting system, on demand, provide access to additional meeting content such as, for example, links, images, etc
- …